Description
The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintaine
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 25 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Belkin linksys Wrt 160nl
|
|
| CPEs | cpe:2.3:h:belkin:linksys_wrt_160nl:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Belkin linksys Wrt 160nl
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:03:04.118Z
Reserved: 2021-01-18T00:00:00.000Z
Link: CVE-2021-25310
Updated: 2024-08-03T20:03:04.118Z
Status : Modified
Published: 2021-02-02T15:15:16.840
Modified: 2024-11-21T05:54:43.200
Link: CVE-2021-25310
No data.
OpenCVE Enrichment
No data.